Sign in to view Able’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Able’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Greater Chicago Area
Sign in to view Able’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
2K followers
500+ connections
Sign in to view Able’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Able
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Able
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Able’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Articles by Able
-
#TBT (ThrowBack Thursday)
#TBT (ThrowBack Thursday)
There have been a number of recent announcements about companies deciding to offer Kubernetes as part of their…
1
Activity
2K followers
-
Able Palacios shared thisSecure libraries from Chainguard can help protect public sector from these types of attacks.Secure-by-default: Chainguard customers unaffected by the Trivy supply chain attackSecure-by-default: Chainguard customers unaffected by the Trivy supply chain attack
-
Able Palacios reposted thisAble Palacios reposted thisAs I think forward to what the future will look like ahead of the first @Chainguard OS FUD (steering committee), I think about the size and scale of what @Chainguard is doing. If you think about it in terms of sheer package volume, Chainguard has the largest number of managed/supported packages of any vendor. Read that again, of ANY enterprise Linux distribution. When you exclude community managed repositories like EPEL and universal, Chainguard OS is far and away the leader. So why do I exclude community maintained packages and repositories? They simply don't have the same scrutiny as the official repositories. They don't have the same patch cycles or the same SLAs. If you've ever used one of the big Linux distributions, what's the first thing you do? You either turn on EPEL for RedHat or universal for Ubuntu. As soon as you do that, you shift your SLAs to community SLAs. You shift your security away from Enterprise support agreements, to 'best effort' community support. What Chainguard is showing us here is that when you have a fully Enterprise Assisted Open Source Linux Distribution (this is what I'm coining it for now), you have far greater supply chain security coverage. You have one cat to herd instead of 100s. Chainguard doesn't solve everything, but its showing a model where they provide an assurance and security layer above the open source projects. Securing and maintaining OSS is expensive and labor intensive. Most OSS projects only have 1 or 2 maintainers. Many have no maintainers but are still incredibly critical to many businesses. Leveraging AI, now makes it possible to shift the bulk of the work to AI vs. relying on the project maintainer for care and feeding (patching and hardening). Read more about the Chainguard OS Packages announcement and the Chainguard OS FUD in the comments. #SupplyChain #Security #OSS #SecureByDefault #ChainguardOS
-
Able Palacios reposted thisAble Palacios reposted thisThis wave of attacks is still spreading and will make shai-halud look like a first grade project. Multiple security companies hit (Aqua and Checmarx), one of the largest Python projects in the AI space is now quarantined (litellm), worms across PyPI and NPM. GitHub account compromises, repo account compromises. Dockerhub account compromises. And this is still just the first phase. Each one of these leaks dozens to hundreds of other credentials. The impact here is going to be felt for years.
-
Able Palacios reposted thisAble Palacios reposted thisWe're excited to introduce Chainguard Commercial Builds: a new partnership program that brings the same secure-by-default guarantees our customers rely on for our open source artifacts to the commercial software running alongside them. 🤝 Through partnerships with software vendors, we package their software using the same SLSA L3, AI-native Chainguard Factory that powers the Chainguard Catalog. What this means for customers: • Wall-to-wall secure-by-default coverage across the entire stack • Minimal, hardened containers with reduced attack surface • Full provenance, SBOMs, and FIPS readiness • CVE remediation SLAs What this means for commercial vendors: • Ship hardened containers without building and maintaining security pipelines • Meet customer supply chain security expectations out the box • Win regulated deals more easily • Create a potential new revenue stream through rev sharing We’re excited to launch with early partners including Azul, Chainloop, Elastic, Expanso, F5 NGINX, GitLab, Grafana Labs, Mattermost, Nirmata, Percona, Smallstep, and Tiger Data (creators of TimescaleDB). Commercial Builds are available in the Chainguard Catalog today! https://lnkd.in/gPTtjzJX
-
Able Palacios reposted thisAble Palacios reposted this🐍 Most Python applications trust hundreds of dependencies they didn’t build. 🐍 That’s the reality of modern software. The Python ecosystem moves fast because of PyPI, but that speed also creates real challenges for teams trying to ship secure software: • You rarely know how a package was built • Vulnerabilities can remain in packages long after fixes exist • Transitive dependencies quietly expand your attack surface • Provenance and integrity are often hard to verify One emerging approach to improving this is secure package rebuilds. Instead of consuming prebuilt artifacts directly from public registries, packages can be rebuilt from source in a controlled environment, with supply chain security practices baked in — such as provenance, vulnerability remediation, and reproducible builds. This is the idea behind Chainguard Libraries for Python: providing Python packages rebuilt securely from source while staying compatible with standard Python tooling. If you're interested in how this works (and why it matters for Python supply chains), this overview breaks it down: https://lnkd.in/gm9Fq9Rf
-
Able Palacios shared thisAt the Billington State and Local CyberSecurity Summit this morning, Nick Andersen made a point that stuck with me: Cybersecurity leaders can no longer plan around a traditional 10–14 day patch cycle for critical threats. That timeline was built for a different era. Today, AI is accelerating exploitation, shrinking response windows, and raising the cost of operational delay. When adversaries can move in days, “we’ll get it in the next maintenance window” is no longer a serious risk strategy. For public sector teams, that means the conversation has to be bigger than just patching faster. It also has to include reducing the vulnerability burden those teams inherit from the software they run. That is a big part of why software supply chain security matters. If remediation windows keep shrinking, organizations need to reduce the avoidable risk they inherit from the software they run. That is exactly why Chainguard is relevant to this conversation. #Cybersecurity #PublicSector #SoftwareSupplyChain #Chainguard
-
Able Palacios shared thisFriday Funny to end the week... I saw a post promoting AI-driven AppSec that basically says the competitive question is changing. Today: “We find bugs faster.” Tomorrow: “AI finds the bug and writes the patch in the same session.” (still pretty early/preview-y.) It immediately made me think of great rapper/philosopher...Lil' Jon: “Don’t start no stuff, won’t be no stuff.” Which is kind of the Chainguard take: Instead of racing to find bugs faster—or someday find and fix them automatically faster—maybe the move is to start with fewer bugs in the first place. Happy Friday. 🙂 #AppSec #DevSecOps #OpenSource #SoftwareSupplyChain
-
Able Palacios shared thisI’ve always felt proud of work like this — especially from my time at Red Hat. Bringing open-source solutions into public sector organizations gave me a real sense of purpose because it helped them do what they needed to do in a more cost-effective way. A Linux OS could often be both cheaper and more secure than proprietary alternatives, and the same was true across many of the software categories we entered. It still feels great to be part of a company doing something very similar now — but with an even stronger focus on making open-source consumption safer than ever before. https://lnkd.in/g2HefjSZ
-
Able Palacios shared thisState and local agencies are under pressure to modernize securely while managing smaller teams and tighter budgets. Forrester’s TEI study found that Chainguard Containers delivered: • 233% ROI and <6-month payback • 90% reduction in time spent on vulnerability tracking and remediation • 90% drop in vulnerabilities • Faster delivery cycles and better compliance outcomes In today’s state and local government environment, efficiency isn’t optional. It’s mission-critical.Forrester TEI study: Chainguard Containers delivered 233% return on investmentForrester TEI study: Chainguard Containers delivered 233% return on investment
-
Able Palacios liked thisAble Palacios liked thisImportant announcement from our partners at Chainguard yesterday. Here's what I think it means. https://lnkd.in/dmWM_k_E
-
Able Palacios liked thisAble Palacios liked thisA cyberattack on infrastructure isn’t just a technical problem. It can quickly become a matter of life and death. Cybersecurity experts are warning about the growing threat of cyber-physical attacks targeting the systems that keep our society running. ⚡ Power grids 💧 Water systems 🏥 Hospitals 🚆 Transportation networks 🌾 Food and agriculture 🏭 Manufacturing These attacks don’t just steal data. They disrupt real-world systems, and when those systems fail, communities feel the impact immediately. As someone who has spent decades working at the intersection of cybersecurity and critical infrastructure, this warning should concern all of us. Cybersecurity is no longer just an IT issue. It is about public safety, economic stability, and national resilience. We urgently need: • Stronger information sharing across sectors • Greater collaboration between government, industry, and academia • More focus on protecting operational technology and industrial systems • A workforce prepared to defend our critical infrastructure The question is no longer if cyber-physical attacks will occur. The real question is: Are we ready when they do? 👉 For those working in energy, water, healthcare, transportation, manufacturing, and food & agriculture - what steps is your organization taking to prepare for cyber-physical threats? #CyberSecurity #CriticalInfrastructure #CyberPhysicalSecurity #OperationalTechnology #FoodSecurity #NationalSecurity #Resilience #MissionCriticalCoalition of information-sharing groups warns of cyber, physical attacksCoalition of information-sharing groups warns of cyber, physical attacks
Honors & Awards
-
FY18 SLED Rep of the Year Finalist
Red Hat, Inc.
-
FY16 SLED Rep of the Year Finalist
Red Hat
Recommendations received
1 person has recommended Able
Join now to viewView Able’s full profile
-
See who you know in common
-
Get introduced
-
Contact Able directly
Other similar profiles
Explore more posts
-
TaVonne H.
Langner, Inc. • 1K followers
OT Reality Check: Active discovery isn’t “controversial.” It’s foundational. Stop letting vendors fearmonger you into inaction. The Joint Cyber Defense Collaborative (yes, the one with CISA, NSA, DOE, and more) just released their “Foundations for OT Cybersecurity” guide. And what do they say, loud and clear? “Accurate, complete, and timely asset inventory is foundational to risk-based decision-making.” “Asset discovery should use both passive and active methods as appropriate.” That last part? It’s where the industry narrative starts to fall apart. 🚫 “As appropriate” does not mean “never.” 🚫 It does not mean “wait for your IDS to guess what you have.” 🚫 It does not mean “keep buying more sensors.” ✅ It means talk to your devices in their native protocols and get the real answers. Here’s the truth: • Your PLCs and switches are designed to respond to their own protocol queries. • Active discovery is not dangerous. If your device crashes when asked “What’s your name?” in its own language, you’ve got bigger problems than discovery. • Some of the world’s largest manufacturers trust OTbase to run full active discovery on their OT networks—every single day. The only reason active discovery has been vilified is because certain vendors can’t do it. So they spread fear, uncertainty, and doubt to keep you buying what they do sell: expensive detection and pretty dashboards with incomplete data. Active > passive. Always. And combining both? That’s just layering bad data on missing data and calling it “context.” 🧠 You don’t need more noise. You need clarity. Schedule a 15-minute micro demo to see what a real OT asset inventory looks like: https://lnkd.in/e8RbYFHQ #assetinventory #operationaltechnology #cybersecurity #activediscovery #passivediscovery #JCDC #OTbase #networkvisibility #ICSsecurity #OTsecurity
8
1 Comment -
Douglas Levin
K12 SIX • 4K followers
K-12 Cybersecurity Insider | 8/11/2025 In this edition: * Ohio Enacts Cybersecurity Regulations for Schools * Federal Cyber Grant Funds for State, Local Cybersecurity Released * Smart ‘Vape’ Sensor Widely Deployed in Schools Vulnerable to Hacking Read more and sign up to get it delivered straight to your inbox: https://lnkd.in/eV4guZj4 #edtech #edusec K12 SIX
27
1 Comment -
Cassi W.
Spectrum Business for… • 7K followers
Hackers accessed Social Security numbers, state IDs, and license plate numbers - 𝘄𝗶𝘁𝗵 𝘁𝗵𝗲 𝗯𝗿𝗲𝗮𝗰𝗵 𝗮𝗳𝗳𝗲𝗰𝘁𝗶𝗻𝗴 𝗺𝗼𝗿𝗲 𝗿𝗲𝘀𝗶𝗱𝗲𝗻𝘁𝘀 𝘁𝗵𝗮𝗻 𝗦𝗵𝗲𝗯𝗼𝘆𝗴𝗮𝗻'𝘀 𝗽𝗼𝗽𝘂𝗹𝗮𝘁𝗶𝗼𝗻 𝗼𝗳 𝟱𝟬,𝟬𝟬𝟬. The Chort ransomware gang continues to target government and educational institutions, as widespread vulnerabilities are prevalent in this space. https://lnkd.in/gkUiyTDT
13
-
Splunk
784K followers
Optimize your monitoring strategy by choosing the right threshold types to detect anomalies effectively and reduce noise. Splunk Lantern's Choosing the right threshold types shows you how to learn how to tailor your thresholds for better ITSI insights and efficiency: https://splk.it/4qZo7iu
41
2 Comments -
COPE Health Solutions
25K followers
If you can’t trust data, you can’t move MSSP performance. In this new piece, Timothy Hudgins breaks down the data disciplines; engineering, management, and analytics, that enable targeted outreach and predictable results. CHS’s ARC platform powers these capabilities to drive measurable impact. 📈 Read more here: https://lnkd.in/gtnUvRrR #MSSP #HealthcareAnalytics #ACO #ValueBasedCare
9
-
Michael Bakaic
✒ Do today what others will… • 15K followers
The most effective prospecting doesn't happen in a boardroom, it happens where people can build dynamic relationships. That’s what I saw with Rick Irvine from West Michigan Technology Services Services at a golf outing. Using The Cyber Score, he was able to go from a simple handshake to an "on-the-spot" diagnosis, showing local business owners the exact number of their company’s exposed credentials on the Dark Web. The most powerful part? That single data point creates more urgency and trust than any sales pitch ever could. It’s an incredible way for an MSP to transform a casual event into a pipeline of qualified leads.
13
-
Christopher Prangley
5K followers
🚨 What happens when ransomware hits a hospital? Lives — not just data — are on the line. This week on #SpeedData, J.D. Whitlock, CIO at Dayton Children's Hospital, shares how his team prepares for the inevitable and minimizes damage when ransomware strikes. 🛡️ “You’re never going to stop the bad guys from getting over that first wall,” J.D. says. “So we do everything we can to keep the bad guys out of the family jewels." Tune in to hear how Dayton Children’s: ✔ Stays resilient in the face of ransomware ✔ Defends critical systems beyond MFA ✔ Keeps care uninterrupted—even under attack 💻 Watch now: https://lnkd.in/gbmWh3-8 #CyberResilience #DataSecurity #CIO
8
-
Fortra
50K followers
What happens when cybersecurity meets community? Fortra is proud to be featured in the Minnesota Technology Association’s Membership Spotlight. From AI-powered threat detection to our commitment to Minnesota’s tech ecosystem, we’re building a safer future together. We talk about: 🔹 Why a unified security approach matters 🔹 How AI is changing cyber defense 🔹 What inspires us in the Minnesota tech community 📖 Read the full spotlight: https://lnkd.in/gq7dCRYj
23
-
Jeremy Miller
Lionfish Cyber Security • 10K followers
FOR IMMEDIATE RELEASE Lionfish Cyber Security and Ball State University Pioneer Revolutionary Statewide Program to Protect Indiana's Critical Infrastructure Groundbreaking "By, With, and Through" Partnership Transforms Students into Cyber Guardians, Successfully Completes First Infrastructure Assessment at Gaston Water Works INDIANAPOLIS, IN – July 8, 2025 – Lionfish Cyber Security, a mission-driven, disabled veteran-owned cybersecurity firm, today announced the successful completion of its first critical infrastructure security assessment in partnership with Ball State University. The assessment—conducted by Ball State students at Gaston Water Works public water facility—marks the official launch of a groundbreaking statewide initiative to protect Indiana’s essential services through university-led cybersecurity programs. The groundbreaking program, inspired by U.S. Army Green Beret methodology, deploys trained university students as "Cyber Guardians" to assess and strengthen cybersecurity defenses at water treatment facilities, power grids, and local government systems across Indiana. Eight undergraduate and graduate students from Ball State University's Center for Information and Communication Sciences (CICS) conducted the comprehensive security evaluation under the mentorship of cybersecurity professionals. "Water treatment facilities are increasingly becoming targets for cyberattacks, with incidents reported across the nation in recent years," said Dr. David Hua, Associate Director of the Center for Information and Communication Sciences at Ball State University. "This partnership represents a proactive approach to infrastructure protection that benefits everyone involved—students gain invaluable real-world experience, facilities receive professional-grade security assessments, and Indiana's critical infrastructure becomes more resilient." Transforming Education into Action meaningful, hands-on training opportunities; students develop the practical skills employers demand; and our critical infrastructure becomes more resilient against the escalating threat of cyberattacks. Most importantly, Indiana advances the intent of newly enacted laws like SB 472 and SB 459—helping protect the families, businesses, and communities we’re all committed to defending.” With the national cybersecurity workforce gap now exceeding 450,000 unfilled positions, we simply don’t have enough people to protect what matters most. But this ‘by, with, and through’ methodology works. It mobilizes local talent at scale, embeds them where they're needed most, and builds lasting capability from the inside out. To read the rest please go to https://lnkd.in/gzMUkX_Z Thank you this would not have been possible without your help. Gaston Water Works, Ray Gillespie Ball State Team Dr. Firoz Khan, PhD Dr. David Hua Joel Wiredu Lionfish Team Dr. Shadi Jawhar Diane M. Janosek, PhD, Esq. Ryan J. Bardes Craig K
55
12 Comments -
Alice Egan
SaaS Savvy • 4K followers
Lots of SCs get frustrated when AEs don’t intro them. But let’s be honest — Lots of SCs don't fully leveraging the intro when they do get one. Remember - even within the Presales community, we don’t fully understand each other’s titles. Assume your SC/SE/SA title tells them NOTHING! Instead, give them your elevator pitch: ✅ What you are ✅ What that actually means ✅ Why you’re here ✅ A little something memorable Not only does this frame your role clearly — It also primes the room for WHY you’re about to ask 47 million questions in the remaining 58 minutes of yet another Zoom call. On my Diary of a Sales Engineer episode, Sameer, Ryan, and I swapped SC elevator pitches. Here’s what mine looked like when I was a Fintech SC: “Hi, I’m Alice Egan, Senior Solutions Consultant. I’m a [product] and tech ecosystem expert. I’m here to make sure our solution is the best fit for you by really understanding what you’re trying to solve, what you need to connect to, and why. Also yes - American accent but I'm in two years deep working with London fintech, so I've probably seen your exact use case before." ✅ Title ✅ What that actually means ✅ Value ✅ Something memorable ✅ Street cred Bonus tip? Bring a lil' background into it. Former paralegal now selling legal software? Say it. Former Hill staffer now selling to PubSec? Lead with it. Former support agent turned SC at Zendesk? I often started with that. Buyers don’t care about your title. They care about trust. Relevance. Connection. Your intro is your chance to create that. So… what’s your elevator pitch? 👇
37
11 Comments -
Blackpoint Cyber
20K followers
Attackers aren't slowing down, and neither should your defenses. Our July Vulnerability Review covers the latest high-risk CVEs, active exploits, and what they mean for MSPs managing client environments. Understand the risks. Prioritize the right fixes: https://hubs.ly/Q03BSn1B0 #Cybersecurity #MSP #VulnerabilityManagement #ThreatIntel #BlackpointCyber
21
-
Stream.Security
14K followers
Traditional CSPM tools weren’t built to handle real-time cloud threats. Watch this on-demand session with Jason Nations, Field CISO at Stream, as he breaks down how CDR enables teams to detect and respond to attacks as they happen. 🎥 Watch the webinar here: https://hubs.la/Q03c_X-T0
11
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content